Searched refs:trusted (Results 1 - 25 of 54) sorted by path

123

/linux-master/include/linux/
H A Dif_link.h30 __u32 trusted; member in struct:ifla_vf_info
/linux-master/crypto/
H A Daf_alg.c26 #include <keys/trusted-type.h>
317 !strcmp(key->type->name, "trusted")) {
/linux-master/crypto/asymmetric_keys/
H A Drestrict.c62 * new certificate as being trusted.
65 * matching parent certificate in the trusted list, -EKEYREJECTED if the
209 struct key *trusted, bool check_dest)
222 if (!trusted && !check_dest)
234 if (trusted) {
235 if (trusted->type == &key_type_keyring) {
237 key = find_asymmetric_key(trusted, sig->auth_ids[0],
242 } else if (trusted->type == &key_type_asymmetric) {
246 asymmetric_key_ids(trusted)->id;
270 key = __key_get(trusted);
206 key_or_keyring_common(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted, bool check_dest) argument
328 restrict_link_by_key_or_keyring(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument
356 restrict_link_by_key_or_keyring_chain(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument
[all...]
/linux-master/drivers/block/
H A Dxen-blkfront.c156 module_param_named(trusted, xen_blkif_trusted, bool, 0644);
157 MODULE_PARM_DESC(trusted, "Is the backend trusted");
1781 /* Check if backend is trusted. */
1783 !xenbus_read_unsigned(dev->nodename, "trusted", 1);
/linux-master/drivers/md/
H A Ddm-crypt.c42 #include <keys/trusted-type.h>
2577 !strncmp(key_string, "trusted:", key_desc - key_string + 1)) {
H A Ddm-verity-loadpin.c21 bool trusted = false; local
39 trusted = true;
46 return trusted;
51 * a verity device that is trusted by LoadPin.
59 bool trusted = false; local
79 trusted = true;
85 return trusted;
/linux-master/drivers/net/ethernet/broadcom/bnxt/
H A Dbnxt_sriov.c161 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trusted) argument
170 if (trusted)
205 ivi->trusted = bnxt_is_trusted_vf(bp, vf);
/linux-master/drivers/net/ethernet/cavium/liquidio/
H A Dlio_main.c2995 ivi->trusted = true;
2997 ivi->trusted = false;
3006 static int liquidio_send_vf_trust_cmd(struct lio *lio, int vfidx, bool trusted) argument
3021 trusted);
3049 /* trusted vf is not supported by firmware older than 1.7.1 */
3066 netif_info(lio, drv, lio->netdev, "More than one trusted VF is not allowed\n");
3087 netif_info(lio, drv, lio->netdev, "Failed to set VF trusted\n");
/linux-master/drivers/net/ethernet/fungible/funeth/
H A Dfuneth.h39 u8 trusted:1; member in struct:fun_vport_info
/linux-master/drivers/net/ethernet/hisilicon/hns3/hns3pf/
H A Dhclge_main.c3527 ivf->trusted = vport->vf_info.trusted;
9527 if (vport->vf_info.trusted && vport->vf_info.request_uc_en)
12020 if (vport->vf_info.trusted == new_trusted)
12023 vport->vf_info.trusted = new_trusted;
12524 if (vport->vf_info.trusted) {
H A Dhclge_main.h1045 u32 trusted; member in struct:hclge_vf_info
/linux-master/drivers/net/ethernet/huawei/hinic/
H A Dhinic_sriov.c585 ivi->trusted = vfinfo->trust;
847 dev_info(&sriov_info->pdev->dev, "Set VF %d trusted %s succeed\n",
850 dev_err(&sriov_info->pdev->dev, "Failed set VF %d trusted %s\n",
/linux-master/drivers/net/ethernet/intel/i40e/
H A Di40e_main.c1467 * @trusted: flag if the VF is trusted
1479 bool trusted)
1491 is_any = (trusted ||
1512 * @trusted: flag if the VF is trusted
1529 bool trusted)
1538 vlan_filters, trusted);
1543 trusted);
2631 vlan_filters, pf->vf[vsi->vf_id].trusted);
1475 i40e_get_vf_new_vlan(struct i40e_vsi *vsi, struct i40e_new_mac_filter *new_mac, struct i40e_mac_filter *f, int vlan_filters, bool trusted) argument
1525 i40e_correct_vf_mac_vlan_filters(struct i40e_vsi *vsi, struct hlist_head *tmp_add_list, struct hlist_head *tmp_del_list, int vlan_filters, bool trusted) argument
[all...]
H A Di40e_virtchnl_pf.c1146 if (vf->trusted)
2855 * add/delete unicast MAC addresses, unless the VF is trusted
2857 if (vf->pf_set_mac && !vf->trusted)
2866 /* If the VF is not trusted restrict the number of MAC/VLAN it can program
2944 "Cannot add more MAC addresses, VF is not trusted, switch the VF to trusted to add more functionality\n");
2947 /* If this VF is trusted, it can use more resources than untrusted.
2948 * However to ensure that every trusted VF has appropriate number of
2957 "Cannot add more MAC addresses, trusted VF exhausted it's resources\n");
3138 * administratively by PF or if VF is trusted
[all...]
H A Di40e_virtchnl_pf.h84 bool trusted; member in struct:i40e_vf
/linux-master/drivers/net/ethernet/intel/ice/
H A Dice_sriov.c1402 ivi->trusted = vf->trusted;
1483 * @trusted: Boolean value to enable/disable trusted VF
1485 * Enable or disable a given VF as trusted
1487 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) argument
1506 /* Check if already trusted */
1507 if (trusted == vf->trusted) {
1514 vf->trusted
[all...]
H A Dice_sriov.h46 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted);
100 int __always_unused vf_id, bool __always_unused trusted)
99 ice_set_vf_trust(struct net_device __always_unused *netdev, int __always_unused vf_id, bool __always_unused trusted) argument
H A Dice_vf_lib.c399 assign_bit(ICE_VIRTCHNL_VF_CAP_PRIVILEGE, &vf->vf_caps, vf->trusted);
H A Dice_vf_lib.h108 u8 trusted:1; member in struct:ice_vf
H A Dice_virtchnl.c1829 * add/delete unicast MAC addresses, unless the VF is trusted
2087 dev_err(ice_pf_to_dev(pf), "Can't add more MAC addresses, because VF-%d is not trusted, switch the VF to trusted mode in order to add more functionalities\n",
2277 * If the VF is trusted then the VF is allowed to add as many VLANs as it
2345 dev_info(dev, "VF-%d is not trusted, switch the VF to trusted mode, in order to add more VLAN addresses\n",
2347 /* There is no need to let VF know about being not trusted,
2375 dev_info(dev, "VF-%d is not trusted, switch the VF to trusted mode, in order to add more VLAN addresses\n",
2378 * not trusted, s
[all...]
/linux-master/drivers/net/ethernet/intel/igb/
H A Digb.h100 bool trusted; member in struct:vf_data_storage
H A Digb_main.c4608 * if an un-trusted VF does not provide descriptors to hardware.
7199 /* By default VFs are not trusted */
7200 adapter->vf_data[vf].trusted = false;
7828 !vf_data->trusted) {
7899 !vf_data->trusted) {
9879 if (adapter->vf_data[vf].trusted == setting)
9882 adapter->vf_data[vf].trusted = setting;
9902 ivi->trusted = adapter->vf_data[vf].trusted;
/linux-master/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe.h225 u8 trusted; member in struct:vf_data_storage
H A Dixgbe_ipsec.c902 if (!adapter->vfinfo[vf].trusted ||
1007 if (!adapter->vfinfo[vf].trusted) {
H A Dixgbe_sriov.c110 adapter->vfinfo[i].trusted = false;
956 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted &&
997 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted &&
1178 !adapter->vfinfo[vf].trusted) {
1821 if (adapter->vfinfo[vf].trusted == setting)
1824 adapter->vfinfo[vf].trusted = setting;
1849 ivi->trusted = adapter->vfinfo[vf].trusted;

Completed in 780 milliseconds

123